false
Splunk Blogs
Leadership
6 Min Read
Splunk announces innovations across its observability portfolio to provide organizations deeper visibility into their network health through integrations with Cisco, and faster troubleshooting with the help of AI.

Featured Articles

Security

Learn

Latest Articles

Security 8 Min Read

Unmasking the Enigma: A Historical Dive into the World of PlugX Malware

The Splunk Threat Research Team (STRT) unravels the mystery of a PlugX variant, peeling back the layers of its payload, tactics, and impact on the digital realm.
Industries 3 Min Read

Future-Proofing Resilience: How Manufacturers Are Navigating Growing Pains of IT/OT Convergence

As manufacturing grapples with digitization challenges, Splunker Tom Harrop dives into how the manufacturing industry is future-proofing resilience.
Observability 4 Min Read

The Hidden Side of Observability

Everything is “observability” these days. But not all solutions are created equally. In fact, they are very different once you look behind the (architectural design) curtain. They have very different architectures and don’t collect data in the same way. Find out what the differences are and what you need to consider.
Security 6 Min Read

User Behavior Monitoring with M-21-31

OMB M-21-31 requires US Federal Civilian agencies to implement user behavior monitoring. We'll explain what that means and how to do it right.
Observability 8 Min Read

Why Is Log Data So Important In Observability?

Traditional monitoring approaches struggle in digital platforms and they do not collect the rich data contained in the logs. Observability, with OpenTelemetry, is the key to managing these platforms and it is based on the capture and analysis of three types of telemetry; metrics, traces and logs.
Leadership 4 Min Read

2024 Predictions: AI Innovation Meets Digital Resilience

Splunk’s 2024 Predictions features three editions – Executive, Security and Observability – sharing insights and strategies for the era of AI.
Learn 4 Min Read

Conway’s Law Explained

In business, Conway's Law says: your business outcomes will be a direct reflection of your company's internal structure — good or bad. Read more here.
Security 6 Min Read

Detecting Dubious Domains with Levenshtein, Shannon & URL Toolbox

Got some parsed fields that you're ready to analyze... possibly for threat hunting? We'll use Levenshtein, Shannon & URL Toolbox to show you how!
Security 10 Min Read

Take a SIP: A Refreshing Look at Subject Interface Packages

Splunker Michael Haag dives into Subject Interface Packages (SIPs) and their role in Windows security, exploring how SIPs can be exploited by malicious actors to bypass security measures and sign malicious code.